1 min
Cyberwarfare requires “serious work on the resilience of cyberspace” (Henri Verdier)
The current events in Ukraine lead us to revisit the round table “A New Cold War in Cyberspace” at the FIC 2021. Henri Verdier, Ambassador for the Digital Affairs at the Ministry of Europe and Foreign Affairs (MEAE), defended the need to improve the resilience of global cyberspace as a whole, an action that is complementary to the strengthening of standards of responsible behaviour by States.
Security and Stability in Cyberspace -
Estelle Augat - 17 March 2022
To read also
- Cyber industrial safety
- Security and Stability in Cyberspace
- Cybercrime
- Cyber risks
- Operational security
- Antifraud action
- Digital identity & KYC
- Digital Sovereignty
- Digital transition
Cyber industrial safety
4 April 2022
21 U.S. LNG producers hacked
U.S. cybersecurity firm Resecurity recently revealed a massive hacking operation targeting 21 U.S. liquefied natural gas (LNG) producers.24 November 2021
The French food giant Avril victim of a cyberattack
On 3 November 2021, the Avril group, victim of a cyberattack, decided to cut its IT network, causing a slowdown of its activity25 October 2021
Thales strengthens its cooperation with Microsoft Azure
Thales strengthens its cooperation with Microsoft Azure and joins MISA25 October 2021
Airbus CyberSecurity and Alstom signed a partnership
Airbus CyberSecurity and Alstom signed a partnership to strengthen rail transport cybersecurity25 October 2021
Nozomi Networks’ survey
OT/ICS cybersecurity threats are on the rise, according to a survey by Nozomi Networks22 October 2021
SCADAfence & Keysight Technologies
SCADAfence partners with Keysight Technologies to improve the security of industrial OT networksSecurity and Stability in Cyberspace
19 May 2022
Can Russia really cut itself off from the global Internet, and does it really want it?
There is no denying it: Russia is preparing the digital ground so that it can one day separate itself from the rest of the global Internet. And the war in Ukraine has only accelerated the process. ...17 May 2022
Cybersecurity… The fifth dimension
Cybersecurity, an obscure realm to the uninitiated masses, is nonetheless taking on crucial significance and becoming a tangible reality, gaining notoriety in recent years and establishing itself ...5 May 2022
China: cyber espionage against Russia
On 27 April 2022, Secureworks uncovered a cyber espionage campaign specifically targeting Russia and attributed to China.25 April 2022
Citizen Lab reveals new Pegasus infections
The Canadian NGO Citizen Lab has just detailed two new European offensives by Israeli spyware programs Pegasus and Candiru: one targeted the British government, the other the Catalan independence ...25 April 2022
European Commission targeted by Pegasus
Four members of the European Commission—including Didier Reynders, European Commissioner for Justice—were allegedly targeted by Pegasus, NSO’s spyware.20 April 2022
[REPORT] Videogames, a new weapon of influence
On February 24th, Russian Armed Forces launched a multipronged invasion of Ukraine, targeting Kharkiv in particular, the country’s second largest city. Located forty or so kilometers from the ...Cybercrime
9 May 2022
Infiltrating the malware sales market
The Institute for Combating Economic Crime of the Arc School of Management in Neuchatel, in collaboration with the School of Criminology of the University of Montreal, has conducted a study on the ...2 May 2022
NFTs, the new playground for cybercriminals
Today, non-fungible tokens are attracting everyone, and hackers do not want to be beholden. Account usurpation, phishing campaigns, or counterfeit NFTs: the number of cases of hacking has increased ...26 April 2022
Crowd security: successfully fighting cyber attacks together
Collaborative security for computers, servers, containers, and even cloud services on the Internet should enable a modern version of the fight against intruders. Is crowd security just a myth, or can ...25 April 2022
Ukraine has prevented a Sandworm attack on its power grid
The Ukrainian government’s CERT managed to block an attack on its power grid attributed to Sandworm, a group linked to Russian intelligence.25 April 2022
Microsoft takes control of ZLoader botnet infrastructure
Microsoft has announced that it has carried out a major offensive against the ZLoader botnet and take control of the domains it was using.11 April 2022
International military organisations targeted by cybercriminals
Google’s Threat Analysis Group warns of recent activities of cybercriminal groups against military organisations, including a NATO centre.Cyber risks
5 May 2022
Fighting deepfakes: a “top priority” for Europol
A report by the Europol Innovation Lab says that “deepfake prevention and detection” must be “top law enforcement priority.“25 April 2022
Cyberattacks and cognitive biases: what are our behaviours?
A cyberattack often requires the attacker to deploy strategies that are intended to trigger expected reactions from the target. Some of these reactions are governed by cognitive biases.25 April 2022
Cybersecurity maturity of large organisations: “Could do better”
There is still room for improvement in this area, as shown by the benchmark carried out by the consultancy firm Wavestone among more than 75 of its clients. It gives them an overall maturity score ...22 April 2022
What cybersecurity for the space sector? Ideas from the CYSAT conference
Threats to space are increasing. Such is the observation made by many specialists and players in cybersecurity and space at the CYSAT conference held in Paris on 6 and 7 April. At Station F, they ...20 April 2022
ETIs in the face of cyber risk: playing the cyber proximity game
Often with little or no protection against cyber risks, intermediate-sized enterprises (aka ETIs) have become prime targets for cybercriminals. Their digital hygiene and their ‘protective ...11 April 2022
What place should cybersecurity have in annual reports?
Organisations—whether private or public—are responsible for their computer networks and the data they use. However, the annual reports they publish to present their results and review their ...Operational security
25 April 2022
Critical asset protection in the Active Directory: What do you need to know?
How can you protect your critical assets in Active Directory thanks to the privileged access workstations (or PAWs)? To understand the ins and outs, follow the advice of Sylvain Cortes, Security ...11 April 2022
600,000 U.S. cybersecurity jobs sit empty
A recent analysis by CyberSeek confirms the shortage of cybersecurity talent in the U.S., with 600,000 unfilled positions for 1 million current employees.28 February 2022
$77.5 billion in cybersecurity M&As in 2021
Momentum Cyber’s latest annual report on cybersecurity financing reveals a record $77.5 billion in total M&A activity in 2021.28 February 2022
Cybersecurity in India: the market almost doubled during the pandemic
The pandemic has seen ransomware attacks explode in India, hitting the country’s businesses hard. Fortunately, the Indian ecosystem is getting organised and startups are gaining momentum, ...26 January 2022
Cloud: Google acquires cybersecurity startup Siemplify
Google confirmed in early January 2022 that it had acquired Israeli cybersecurity startup Siemplify and integrated it into Google Cloud Security.24 November 2021
Security breaches: Joe Biden’s ultimatum to federal agencies
U.S. President Joe Biden and the Cybersecurity and Infrastructure Security Agency (CISA) give U.S. federal agencies six months to fix their security flawsAntifraud action
11 April 2022
USA: 5 years in prison for an Estonian hacker specialising in financial fraud
A U.S. court has sentenced Maksim Berezan, an Estonian cybercriminal involved in 13 ransomware attacks and numerous financial frauds, to five years in prison.21 February 2022
Cryptocurrency: $14 billion in fraud in 2021
Financial analysis firm Chainalysis has just unveiled its 2021 cryptocurrency fraud assessment, which reaches $14 billion.24 November 2021
Russian “fraud king” cybercriminal sentenced
The U.S. justice system has sentenced Aleksandr Zhukov—a Russian cybercriminal and self-proclaimed “king of online ad fraud—,” to 10 years in prison25 October 2021
U.S. seeks to strengthen global cooperation against cybercrime
On 13-14 October 2021, U.S. President Joe Biden convened a virtual summit with officials from about 30 countries to accelerate cooperation in the fight against cybercrime, including on the issue of ...27 July 2021
Crypto-assets – New technologies can help combat AML/CFT
While Anti-Money Laundering/Combating the Financing of Terrorism international standards are in place, most jurisdictions have just begun to implement and enforce them. The supervision of ...20 July 2021
2020: A record year for data leaks
Data leaks have taken off like never before in 2020. Such is the conclusion of the new Data Breach Barometer. This study has been unveiled during a thematic breakfast hosted by the International ...Digital identity & KYC
16 May 2022
How digital KYC is transforming business
Formerly used to combat money laundering, “know your customer” (KYC) is expanding its scope and recurrence to become cyber-resilient. Previously a characteristic of the financial sector alone, ...25 April 2022
USA: towards a federal digital identity framework?
In an open letter, identity security experts have urged U.S. President Joe Biden to deploy a federal digital identity framework by Executive Order.16 December 2021
Estonia supports UNHCR’s digital identity for refugees
The UN High Commissioner for Refugees (UNHCR) detailed on 6 December 2021 how Estonia provided it with a digital identity specialist to accelerate its digital transformation.24 November 2021
UK to launch digital identity in April 2022
The UK government has said that the first version of its digital identity service—called One Login—is expected to go live in April 202224 November 2021
Senator wants to control digital identity on social media
Senator proposes law to control digital identity of social media users25 October 2021
Monaco: a new digital identity document
Monaco: 70% of those who applied for a new identity document opted for the digital versionDigital Sovereignty
2 May 2022
The digital dollar: an innovative project with many questions
Digital currency projects led by central banks have been on the rise for several months, driven in particular by the explosion of the crypto-asset market. In the United States, the prospect of a ...2 February 2022
Prospecting file and GDPR: 3 steps not to be missed!
With the development of Big Data, the amount of data generated by browsing networks, subscribing to online contracts, or the use of software solutions is essential for all organizations.6 January 2022
Towards an international regulation of algorithms?
By disrupting organisations, artificial intelligence (AI) algorithms have revealed previously unknown vulnerabilities. For this reason, there is a growing demand for a legislative framework governing ...21 December 2021
The Dutch Online Trust Coalition on the EUCS
The OTC (Online Trust Coalition) in the Netherlands, a Private-Public partnership of 24 organizations in the Netherlands, have recently expressed their concerns in a recent letter to the EU ...16 December 2021
[Budapest Convention] A second protocol to fight cybercrime
Almost 20 years to the day after the Budapest Convention was opened for signature, a second additional protocol was adopted on 17 November by the Committee of Ministers of the Council of Europe. ...16 December 2021
Act No. 2021-1485 to reduce the environmental footprint of the digital sector in France
The law is an illustration of the convergence between the digital transformation and the ecological transition. It is inspired by the information report drawn up by two senators, dated 24 June ...Digital transition
19 May 2022
The shadow of social credit looms over Europe
It rules the lives of 1.4 billion Chinese people. It shapes the thoughts of 330 million Americans. In different forms, social credit is gaining ground at the heart of a European continent still ...5 May 2022
Google: new personal data policy
Internet users can now have additional personal data removed from Google search results: telephone number, email address, postal address, etc.27 April 2022
Women4Cyber, a foundation for the inclusion of women in cybersecurity
Cybersecurity has become a sector of paramount importance to strengthen our economic and digital sovereignty strategy. In recent years, many initiatives have been launched to boost the ecosystem and ...20 April 2022
Cybersecurity: Canada accelerates, with Quebec on the front line
The launch of the Canadian In-Sec-M cluster—an $80 million investment by Quebec to support research, development, and marketing—and the creation of the first ministry of cybersecurity and ...11 April 2022
EU public consultation on connected vehicle data
The European Union has opened a public consultation—which will last until 21 June 2022—on access to data generated by connected vehicles.4 April 2022